Follow
Hideaki Sone
Hideaki Sone
Verified email at tohoku.ac.jp - Homepage
Title
Cited by
Cited by
Year
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation
Y Hayashi, N Homma, M Miura, T Aoki, H Sone
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1032014
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2013
852013
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
Theory and Applications of Models of Computation: 12th Annual Conference …, 2015
712015
The Minimum Number of Cards in Practical Card-Based Protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
652017
Role of the metallic phase arc discharge on arc erosion in Ag contacts
H Sone, T Takagi
IEEE Transactions on Components, Hybrids, and Manufacturing Technology 13 (1 …, 1990
651990
Flexible access management system for campus VLAN based on OpenFlow
Y Yamasaki, Y Miyamoto, J Yamato, H Goto, H Sone
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 347-351, 2011
622011
Interactive physical zero-knowledge proof for Norinori
JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone
Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019
542019
Card-Based Physical Zero-Knowledge Proof for Kakuro
D MIYAHARA, T SASAKI, T MIZUKI, H SONE
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2019
522019
Securely computing the three-input majority function with eight cards
T Nishida, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 193-204, 2013
502013
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2013
492013
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
472011
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2013
462013
A new dynamical domain decomposition method for parallel molecular dynamics simulation
V Zhakhovskii, K Nishihara, Y Fukuda, S Shimojo, T Akiyama, S Miyanaga, ...
CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid …, 2005
442005
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
Y Abe, Y Hayashi, T Mizuki, H Sone
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 3-8, 2018
362018
Pile-Shifting Scramble for Card-Based Protocols
A NISHIMURA, Y HAYASHI, T MIZUKI, H SONE
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
352018
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
342009
Card-based protocols using unequal division shuffles
A Nishimura, T Nishida, Y Hayashi, T Mizuki, H Sone
Soft Computing 22 (2), 361-371, 2018
292018
Securely computing three-input functions with eight cards
T Nishida, Y Hayashi, T Mizuki, H Sone
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
282015
Card-based protocols for secure ranking computations
K Takashima, Y Abe, T Sasaki, D Miyahara, K Shinagawa, T Mizuki, ...
Theoretical Computer Science 845, 122-135, 2020
272020
Card-based zero-knowledge proof for sudoku
T Sasaki, T Mizuki, H Sone
9th International Conference on Fun with Algorithms (FUN 2018), 2018
272018
The system can't perform the operation now. Try again later.
Articles 1–20